Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Law

Section 3: Privacy, Institute Of Bill Of Rights Law, William & Mary Law School Oct 1994

Section 3: Privacy, Institute Of Bill Of Rights Law, William & Mary Law School

Supreme Court Preview

No abstract provided.


Drug Testing College Athletes: Ncaa Does Thy Cup Runneth Over, Stephen F. Brock, Kevin M. Mckenna, Rhett Traband Sep 1994

Drug Testing College Athletes: Ncaa Does Thy Cup Runneth Over, Stephen F. Brock, Kevin M. Mckenna, Rhett Traband

West Virginia Law Review

No abstract provided.


Life's Sacred Value—Common Ground Or Battleground, Alexander Morgan Capron May 1994

Life's Sacred Value—Common Ground Or Battleground, Alexander Morgan Capron

Michigan Law Review

A Review of Life's Dominion: An Argument About Abortion, Euthanasia, and Individual Freedom by Ronald Dworkin


The Consensual Electronic Surveillance Experiment: State Courts React To "United States V. White", Melanie L. Black Dubis Apr 1994

The Consensual Electronic Surveillance Experiment: State Courts React To "United States V. White", Melanie L. Black Dubis

Vanderbilt Law Review

It has long been recognized that a state, if its citizens so chose, may "serve as a laboratory" for economic and social legislation. In an era of new federalism, state courts have experimented by extending individual rights under state constitutions that the United States Supreme Court, beginning with the Burger Court, refused to recognize under the federal constitution. Although this approach has been criticized by the judiciary and academia, it continues to be a driving force in the development of individual rights.

In United States v. White, the Supreme Court held that the police practice of obtaining evidence with warrantless …


Legislative Amendments To The District Of Columbia's Vital Records Act: Medical Cause Of Death Privacy, Suzanne Brette Greene Mar 1994

Legislative Amendments To The District Of Columbia's Vital Records Act: Medical Cause Of Death Privacy, Suzanne Brette Greene

University of the District of Columbia Law Review

No abstract provided.


The American Health Security Act And Privacy: What Does It Really Cost?, 12 J. Marshall J. Computer & Info. L. 585 (1994), Susan E. Corsey Jan 1994

The American Health Security Act And Privacy: What Does It Really Cost?, 12 J. Marshall J. Computer & Info. L. 585 (1994), Susan E. Corsey

UIC John Marshall Journal of Information Technology & Privacy Law

For many years, the American health care system has been plagued by dependence on a cumbersome paper-based recording system that adds to the astronomical cost of health care in the U. S. In 1994, President Clinton proposed a national health care plan, the American Health Security Act, that would ensure comprehensive health care insurance to all Americans regardless of health or employment status. The proposed system depends on a centralized computer system that offers streamlined access to health care information, which must be accessible anywhere the patient goes. Although the proposed system would offer greater efficiency and consistency in the …


United States V. Deaner: Thermal Imagery, The Latest Assault On The Fourth Amendment Right To Privacy, 12 J. Marshall J. Computer & Info. L. 607 (1994), Bradley J. Plaschke Jan 1994

United States V. Deaner: Thermal Imagery, The Latest Assault On The Fourth Amendment Right To Privacy, 12 J. Marshall J. Computer & Info. L. 607 (1994), Bradley J. Plaschke

UIC John Marshall Journal of Information Technology & Privacy Law

The United States government's innovative use of thermal imaging technology to battle against cultivation and trafficking of marijuana is the center of debate. In United States v. Deaner, the District Court of Pennsylvania and Maryland erred in ruling that the United States government's use of thermal imaging technology in detecting the presence of marijuana and cultivation materials in the home of Tab Deaner was proper and did not violate Deaner's Fourth Amendment right to privacy. The Court affirmed Deaner's constitutional right to a subjective expectation of privacy with respect to heat emanating from his home. The Court compared the facts …


1993 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 12 J. Marshall J. Computer & Info. L. 627 (1994), Timothy R. Rabel Jan 1994

1993 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 12 J. Marshall J. Computer & Info. L. 627 (1994), Timothy R. Rabel

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller Jan 1994

Pc Peep Show: Computers, Privacy, And Child Pornography, 27 J. Marshall L. Rev. 989 (1994), John C. Scheller

UIC Law Review

No abstract provided.


Electronic Data Interchange: Uses And Legal Aspects In The Commercial Arena, 12 J. Marshall J. Computer & Info. L. 511 (1994), Robert W. Mckeon Jr. Jan 1994

Electronic Data Interchange: Uses And Legal Aspects In The Commercial Arena, 12 J. Marshall J. Computer & Info. L. 511 (1994), Robert W. Mckeon Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

Electronic Data Interchange (EDI), computer-to-computer communication, allows rapid exchange of information and is capable of dramatically increasing commercial efficiency. Faster than mail, personal meetings and communication via telephone, EDI will include recordkeeping, communication between governments, retail use and healthcare streamlining. EDI may pose future evidentiary problems including proving the source and content of the message. Numerous techniques may offer greater reliability of authentication of electronic messages by creating an audit trail when EDI is used. Using EDI for commercial transactions involving the sale of goods raises questions of contract law and the Uniform Commercial Code regarding the statute of frauds …


§ 117 - The Right To Adapt Into The Fourth Generation And The Source Code Generator's Dilemma, 12 J. Marshall J. Computer & Info. L. 537 (1994), Marvin N. Benn, Richard J. Superfine Jan 1994

§ 117 - The Right To Adapt Into The Fourth Generation And The Source Code Generator's Dilemma, 12 J. Marshall J. Computer & Info. L. 537 (1994), Marvin N. Benn, Richard J. Superfine

UIC John Marshall Journal of Information Technology & Privacy Law

Section 117, of The Copyright Act of 1976, which regulates the copying of a computer software program by an authorized or registered user, serves as an exception or defense to an allegation of software infringement. This exception is grounded in the concept that an individual who lawfully purchases a computer software program should have the right to copy that program to some extent. However, courts have not developed a uniform approach to analyzing Section 117. This paper offers a union of tests used individually by courts to resolve this problem of legal inconsistency. The courts have developed a three-step approach …


Legal Expert System Building: A Semi-Intelligent Computer Program Makes It Easier, 12 J. Marshall J. Computer & Info. L. 555 (1994), Grayfred B. Gray, Bruce J. Maclennan, John E. Nolt, Donald R. Ploch Jan 1994

Legal Expert System Building: A Semi-Intelligent Computer Program Makes It Easier, 12 J. Marshall J. Computer & Info. L. 555 (1994), Grayfred B. Gray, Bruce J. Maclennan, John E. Nolt, Donald R. Ploch

UIC John Marshall Journal of Information Technology & Privacy Law

The Natural Language Expert System Builder (NLESB) assists attorneys in producing intelligent, precise and clear legal documents. This system allows the user to link from one rule to another, which helps the attorney to find differently stated propositions that mean the same thing. In addition, the NLESB serves as a check to verify that the law within the document is in good form. The system promotes consistency by bringing similarities to the attorney's attention, it increases the clarity and precision of an argument within a legal document, and it eliminates passive voice and places the emphasis on the object of …


1993 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Petitioner, 12 J. Marshall J. Computer & Info. L. 645 (1994), Marie-Louise R. Samuels, Thomas W. Poultron, Scott W. Mcmickle Jan 1994

1993 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Petitioner, 12 J. Marshall J. Computer & Info. L. 645 (1994), Marie-Louise R. Samuels, Thomas W. Poultron, Scott W. Mcmickle

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


1993 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Respondent, 12 J. Marshall J. Computer & Info. L. 679 (1994), Spiro P. Fotopoulos, Joseph E. Helweg, Alyce E. Hill Jan 1994

1993 John Marshall National Moot Court Competition In Information And Privacy Law: Brief For The Respondent, 12 J. Marshall J. Computer & Info. L. 679 (1994), Spiro P. Fotopoulos, Joseph E. Helweg, Alyce E. Hill

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Employee/Employer, Sandra S. Klein Jan 1994

Employee/Employer, Sandra S. Klein

Journal Articles

The issue of privacy as it relates to employment in general is one of great concern, both to employers and employees. Both groups are faced with increasing threats to their individual or corporate privacy. Given that such threats carry personal, economic and social consequences, it is not surprising that many people are concerned. The bibliography which follows provides the reader with many sources which should prove useful to those well-versed in the subject, as well as to those who are looking at this issue for the first time.


The Consent Exception To The Warrant Requirement, H. Patrick Furman Jan 1994

The Consent Exception To The Warrant Requirement, H. Patrick Furman

Publications

No abstract provided.


Sexual Freedom And Your Right To Privacy: A Selective Bibliography, Sandra S. Klein Jan 1994

Sexual Freedom And Your Right To Privacy: A Selective Bibliography, Sandra S. Klein

Journal Articles

Like so many other privacy issues, concern over sexual freedom took on more than intellectual overtones with the advent of greater public discussion. As courts and government appeared to enter the most private domain of all, the bedroom, the public's interest in privacy issues dealing with sexual freedom increased dramatically. This bibliography should serve as a valuable tool for researchers who have an interest in this highly controversial area of social concern.


Abortion/Reproductive Rights, Sandra S. Klein Jan 1994

Abortion/Reproductive Rights, Sandra S. Klein

Journal Articles

The issue of a woman's right to choose whether or not to continue with a pregnancy has proven to be complicated for many reasons, not the least of which is the implications for a person's right to do with her body as she sees fit. The bibliography that follows provides the researcher with an in depth look at this issue, with an emphasis on the privacy aspects.


The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra S. Klein Jan 1994

The Right To Die As An Issue Of Privacy: A Selective Bibliography, Sandra S. Klein

Journal Articles

The issue of whether or not an individual has the right to choose when he or she will die, is a very controversial one for many reasons. Further complicating the issue is the question of who, if anyone, has the right to decide for those who are unable to choose for themselves. The bibliography which follows includes articles which discuss this topic from a right to privacy perspective, and should prove useful to those researchers who are new to the subject, as well as to those who are already familiar with the many complex issues involved.


Drug Testing/Use, Sandra S. Klein Jan 1994

Drug Testing/Use, Sandra S. Klein

Journal Articles

Drug testing is one of the most controversial of recent privacy issues. The bibliography which follows provides the reader with access to a wide range of discussion on this topic which is, or should be, of interest to everyone. Whether in our private lives, or on the job, drug use and drug testing will have an impact on every one of us.


Your Right To Privacy And Children's Rights/Family Law: A Selective Bibliography, Sandra S. Klein Jan 1994

Your Right To Privacy And Children's Rights/Family Law: A Selective Bibliography, Sandra S. Klein

Journal Articles

In a society increasingly aware of real or perceived social inequities, it is not surprising to note a greater concern for the rights of children and their families. It is also apparent that privacy issues are an integral subset of the larger social sphere of interests. Privacy aspects can be seen to be involved pervasively throughout the area of law dealing with children and families, especially in view of the fact that there is obvious potential for conflict not only between families and the state, but between children and the families of which they are a part


A Contractual Approach To Data Privacy, Stephanos Bibas Jan 1994

A Contractual Approach To Data Privacy, Stephanos Bibas

All Faculty Scholarship

No abstract provided.


The Encrypted Self: Fleshing Out The Rights Of Electronic Personalities, 13 J. Marshall J. Computer & Info. L. 1 (1994), Curtis E. A. Karnow Jan 1994

The Encrypted Self: Fleshing Out The Rights Of Electronic Personalities, 13 J. Marshall J. Computer & Info. L. 1 (1994), Curtis E. A. Karnow

UIC John Marshall Journal of Information Technology & Privacy Law

The electronic community is faced with a now classic dilemma: the tug-of-war between the desire for a free flow of information and the need for privacy. The problem can be recast as the pull between freedom of access in one direction, and, in the other direction, the right of self-determination and control over the dissemination of information. Often, the same individuals and organizations are vociferously in favor of both interests. The interests at stake are, respectively, those of the community versus those of the individual. The conflict is the traditional juxtaposition, which raises the traditional issue of rights, responsibilities and …


The Copyright And Trade Secret Protection Of Communication Software: Placing A Lock On Interoperability, 13 J. Marshall J. Computer & Info. L. 17 (1994), Steven N. Dupont Jan 1994

The Copyright And Trade Secret Protection Of Communication Software: Placing A Lock On Interoperability, 13 J. Marshall J. Computer & Info. L. 17 (1994), Steven N. Dupont

UIC John Marshall Journal of Information Technology & Privacy Law

The author argues that courts must take into account industry demands for interoperable computer products in determining the proper scope of protection enjoyed by computer software. Part II of the article discusses the technical aspects of a communications software system in the context of a hypothetical software developer. Part III of the article analyzes how compatibility concerns affect the determination of the proper scope of copyright and trade secret protection. Part IV of the article gives an overview of the anti-trust concerns in light of the current debate surrounding interoperability. The article concludes that economically adequate legal protection for communications …


Has The Computer Changed The Law?, 13 J. Marshall J. Computer & Info. L. 43 (1994), David C. Tunick Jan 1994

Has The Computer Changed The Law?, 13 J. Marshall J. Computer & Info. L. 43 (1994), David C. Tunick

UIC John Marshall Journal of Information Technology & Privacy Law

The computer has caused changes to over forty areas of the law. While not exhaustive, the areas of law examined in this article show that computers have caused certain areas of the law to evolve while others remain virtually unchanged. Computer use has not changed in the area of commercial law. Computer contracts can involve hardware, software or services. Whether the Uniform Commercial Code applies to acquisitions has been the subject of much litigation turning on whether the software is canned or custom. Courts analyze the custom software cases under existing tests including the "dominant element" test, the "end product …


Ibm V. Comdisco: Are Modified 3090 Computers Counterfeit?, 13 J. Marshall J. Computer & Info. L. 93 (1994), Amy J. Grason Jan 1994

Ibm V. Comdisco: Are Modified 3090 Computers Counterfeit?, 13 J. Marshall J. Computer & Info. L. 93 (1994), Amy J. Grason

UIC John Marshall Journal of Information Technology & Privacy Law

This casenote discusses the recent settlement between IBM and Comdisco where IBM sued Comdisco and three other independent brokers to restrict the leasing of modified IBM equipment. Specifically, IBM argued that the reconfiguring of its IBM 3090 by the defendants violated IBM’s trademark rights. The note discusses how IBM denied the authenticity of the modified IBM 3090’s. The author argues that the sale or lease of trademarked products, which have been altered but which are so identified cannot, as a matter of law, violate trademark rights. The author further states that by allowing manufacturers to disavow their own products is …


Virtual Reality: The Reality Of Getting It Admitted, 13 J. Marshall J. Computer & Info. L. 145 (1994), Mary C. Kelly, Jack N. Bernstein Jan 1994

Virtual Reality: The Reality Of Getting It Admitted, 13 J. Marshall J. Computer & Info. L. 145 (1994), Mary C. Kelly, Jack N. Bernstein

UIC John Marshall Journal of Information Technology & Privacy Law

Computer animation is the newest tool to turn up in courtrooms around the country in the area of demonstrative evidence. These animations create a virtual reality that lawyers can use to demonstrate objects, situations, or acts to juries -- objects, situations, and acts that would otherwise be difficult for a group of people to completely appreciate or understand through more traditional evidnetiary means. Recent technological advancements mean that this three-dimensional virtual reality can make quite an impact on a jury or judge, without making too great an impact on client's budgets. Computer animation and the various types of virtual reality …


Brown V. Iowa Legislative Council: Struggling With The Application Of The Freedom Of Information Act To Computerized Government Records, 13 J. Marshall J. Computer & Info. L. 123 (1994), Elizabeth M. Dillon Jan 1994

Brown V. Iowa Legislative Council: Struggling With The Application Of The Freedom Of Information Act To Computerized Government Records, 13 J. Marshall J. Computer & Info. L. 123 (1994), Elizabeth M. Dillon

UIC John Marshall Journal of Information Technology & Privacy Law

In 1996, Congress passed the Freedom of Information Act (FOIA) to promote public access of information held by the federal government. Consequently, fifty states followed the lead by passing similar statutes providing public access to information held by state governments. While FOIA statutes facilitates the dissemination of information, the use of "records" in the statutes proves to be problematic in this computer age. Part of the accessible records is the information of redistricting of the states, a federal constitutional requirement on the states every ten years. In the Brown v. Iowa Legislative Council, plaintiff sought to gain access to the …


Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee Jan 1994

Watch Your E-Mail - Employee E-Mail Monitoring And Privacy Law In The Age Of The Electronic Sweatshop, 28 J. Marshall L. Rev. 139 (1994), Laurie Thomas Lee

UIC Law Review

No abstract provided.